US8750848B2 - System and method for limiting communications - Google Patents

System and method for limiting communications Download PDF

Info

Publication number
US8750848B2
US8750848B2 US13/943,589 US201313943589A US8750848B2 US 8750848 B2 US8750848 B2 US 8750848B2 US 201313943589 A US201313943589 A US 201313943589A US 8750848 B2 US8750848 B2 US 8750848B2
Authority
US
United States
Prior art keywords
user
list
communications
communication
wireless device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US13/943,589
Other versions
US20130295896A1 (en
Inventor
Jeffrey M. Sweeney
Jennifer D. Doyle
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CenturyLink Intellectual Property LLC
Original Assignee
CenturyLink Intellectual Property LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CenturyLink Intellectual Property LLC filed Critical CenturyLink Intellectual Property LLC
Priority to US13/943,589 priority Critical patent/US8750848B2/en
Assigned to EMBARQ HOLDINGS COMPANY, LLC reassignment EMBARQ HOLDINGS COMPANY, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DOYLE, JENNIFER D., SWEENEY, JEFFREY M.
Assigned to CENTURYLINK INTELLECTUAL PROPERTY LLC reassignment CENTURYLINK INTELLECTUAL PROPERTY LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: EMBARQ HOLDINGS COMPANY, LLC
Publication of US20130295896A1 publication Critical patent/US20130295896A1/en
Application granted granted Critical
Publication of US8750848B2 publication Critical patent/US8750848B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/006Call diverting means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/2072Schedules, e.g. personal calendars
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas

Definitions

  • the wireless device may include a processor for executing a set of instructions and a memory for storing the set of instructions.
  • the set of instructions may be executed to receive a list of one or more communicating parties that are authorized to communicate with a user at any time, receive a selection to limit communications, determine whether an identifier associated with a communicating party is in the list in response to processing a communication, and connect the communication to the wireless device in response to determining the identifier is in the list.
  • Another embodiment provides a method for limiting communications.
  • a list of one or more communicating parties that are authorized to communicate with a user at any time may be received.
  • a selection to limit communications may be received.
  • An identifier associated with a communicating party may be determined to be on the list in response to receiving a communication.
  • the communication may be connected to a communications device in response to determining the identifier is on the list.
  • the communication system may include a server configured to receive incoming communications from a communications network.
  • the server may also include logic configured to receive a list of one or more communicating parties that are authorized to communicate with a user at any time, receive a selection to limit communications, determine whether an identifier associated with a communicating party is in the list in response to processing a communication, reject the communication in response to conditional criteria set by the user and determining the identifier is not on the list; and connect the communication to a communications device in response to determining the identifier is in the list.
  • the communications device in communication with the server may be configured to receive at least a portion of the communications from the server.
  • FIG. 1 is a pictorial representation of a communications system in accordance with an illustrative embodiment
  • FIG. 2 shows examples of communications devices in accordance with the illustrative embodiments of the present invention
  • FIG. 3 is a block diagram of an interfacing system for setting a preferred caller list in accordance with an illustrative embodiment
  • FIG. 4 is a flowchart of a process for receiving a preferred caller list in accordance with an illustrative embodiment
  • FIG. 5 is a flowchart of a process for implementing a preferred caller list in accordance with an illustrative embodiment
  • FIG. 6 is a graphical user interface for controlling a preferred caller list in accordance with an illustrative embodiment.
  • Illustrative embodiments provide a system and method for call gating.
  • a user may establish a number of individuals or devices that are allowed to call or communicate with a user.
  • the callers are saved in one or more lists.
  • Each caller may be associated with one or more identifiers that allow the caller to communicate with the user.
  • the identifiers may include phone numbers, caller identification information, user names, nicknames, email addresses or other information used for purposes of communication.
  • the user may select to limit incoming communications to those individuals on the preferred caller list by entering a code or providing other input to a communications device, such as a cell phone. Once activated, all calls that are received from callers not included on the list are connected to voicemail or handled according to other instructions of the user.
  • the caller may be prompted to provide input specifying that the communication is an emergency for ensuring that the caller is able to reach the user during an emergency.
  • a voice prompt may prompt a caller to enter a numeric code if the telephone call is an emergency, thereby allowing the call to be connected to the user.
  • FIG. 1 is a pictorial representation of a communications system in accordance with an illustrative embodiment.
  • the communication system 100 of FIG. 1 includes various elements used for wireless and wired communication.
  • the communications system 100 includes a mobile switching center 102 , a local exchange 104 , voicemail systems 106 and 108 , a database 110 , wireless devices 112 and 114 , a transmission tower 116 , a wired network 118 , a home 120 , home telephones 122 and 124 , and a client 126 .
  • the different elements and components of the communications system 100 communicate using wireless communications including satellite connections or hardwired connections, such as fiber optics, T1, cable, DSL, high speed trunks, and telephone lines.
  • the wireless devices 112 and 114 may communicate with the transmission tower 116 using communications protocols, such as time division multiple access (TDMA), code division multiple access (CDMA), global systems for mobile (GSM) communications, personal communications systems (PCS), WLAN, WiMAX, or other frequently used cellular and data communications protocols and standards.
  • the wireless devices 112 and 114 may include cellular phones, Blackberry®, personal digital assistances (PDA), laptops, evolution data optimized (EDO) cards, multi-mode devices, and other wireless communication devices and elements.
  • Communications within the communications system 100 may occur on any number of networks which may include wireless networks, data or packet networks, private networks, publicly switched telephone networks (PSTN), and the wired network 118 .
  • the networks of the communications system 100 may represent a single communication service provider or multiple communications services providers.
  • the features of the embodiments may be implemented by one or more elements of the communications system 100 independently or as a networked implementation.
  • the mobile switching center 102 , voicemail system 106 , and transmission tower 116 are part of a wireless network that is operated by a wireless service provider.
  • the control signals and operational features may be performed by the mobile switching center 102 and the wireless signals may be broadcast from the transmission tower 116 to the wireless devices 112 and 114 .
  • the wireless network may include any number of systems, towers, servers, and other network and communications devices for implementing the features and performing the methods herein described.
  • the mobile switching center (MSC) 102 may be a switch used for wireless call control and processing.
  • the MSC 102 may also serve as a point of access to the local exchange 104 .
  • the MSC 102 is a telephone exchange that provides circuit switched calling and mobility management and may also provide GSM or PCS services to the wireless devices 112 and 114 located within the area the MSC 102 serves.
  • the MSC 102 may include a home locator record (HLR) and virtual locator record (VLR) that may be used to implement different features of the illustrative embodiments.
  • the voicemail system 106 may be an integrated part of the MSC 102 or alternatively may be an externally connected device.
  • the voicemail system 106 may include an integrated database for storing customer and usage information and data.
  • the voicemail system 106 , a server, or other intelligent network device may store user preferences and implement the call gating, as further described herein.
  • the user may interact or send and receive data, information, and commands through the telephones 122 and 124 , wireless device 112 and 114 , or the client 126 .
  • the mobile switching center 102 and voicemail system 106 may include any number of hardware and software components.
  • the MSC 106 is an advanced intelligence network device with software modules equipped to perform call gating features and functions.
  • the local exchange 104 and MSC 102 communicate using a signal control protocol, such as a signaling system number 7 (SS7) protocol.
  • SS7 protocol is used in publicly switched networks for establishing connections between switches, performing out-of-band signaling in support of the call-establishment, billing, routing, and implementing information-exchange functions of the publicly switched network 134 .
  • the local exchange 104 may be owned and operated by a local exchange carrier that provides standard telephone service to any number of users.
  • the local exchange 104 may be a class 5 switch that is part of the network systems of the local carrier.
  • the local exchange 104 may include or may be connected to the voicemail system 106 .
  • the local exchange 104 may also be a Digital Subscriber Line Access Multiplexer (DSLAM), Internet Protocol (IP) gateway, base station, or any other suitable network access point.
  • DSLAM Digital Subscriber Line Access Multiplexer
  • IP Internet Protocol
  • the local exchange 104 may be a wire-line switch or public exchange using time domain multiplexing to provide telecommunications services to a particular subscriber or groups of subscribers.
  • the local exchange 104 may be located at a local telephone company's central office, or at a business location serving as a private branch exchange.
  • the local exchange 104 may provide dial-tone, calling features, and additional digital and data services to subscribers, such as home phones 122 and 124 .
  • the local exchange 104 may also enable VoIP communication of the home telephones 116 and 118 through a data network. VoIP works by sending voice information in digital form in packets, rather than in the traditional circuit-committed protocols of the publicly switched network.
  • the communications system 100 may further include any number of hardware and software elements that may not be shown in the example of FIG. 1 .
  • the communications system and the MSC 102 and local exchange 104 in particular, may include application servers, media servers, service brokers, call agents, edge routers, gateways (signaling, trunking, access, sub, etc.), IP network service providers, adapters, exchanges, switches, users, and networks.
  • the voicemail system 108 is similar to the voicemail system 106 except that it is equipped to handle voicemail for landline customers rather than wireless customers.
  • the local exchange 104 or other components of a wire line network, such as a data, PSTN, VoIP, or other wired network may implement the call gating features and perform the methods herein described.
  • the MSC 102 and the local exchange 104 may include an authentication space.
  • the authentication space may be a partition of the server or other storage designated by the communications service provider.
  • the authentication space may validate that a user or device, such as client 126 , is allowed to authorize the MSC 102 , local exchange 104 , or corresponding voicemail system 106 and 108 to set preferences, implement changes, review information, or perform other updates.
  • a user may be first required to provide a secure identifier, such as a user name, password, or other authentication code or hardware interface, to verify the user is authorized to make changes within the authentication space.
  • the authentication information may be used to create a secure connection between the client and the MSC 102 and the local exchange 104 .
  • the secure connection may be a virtual private network tunnel, an encrypted connection, firewall, or other form of secured communications link.
  • the MSC 102 and local exchange 104 may use any number of gateways, proxies, applications, or interfaces for allowing the client 126 to the MSC 102 and local exchange 104 through the wired network 118 .
  • the client 126 may use a wireless network or other network to access the MSC 102 and local exchange 104 .
  • the MSC 102 and local exchange 104 may use a host client application for communicating with numerous clients.
  • the home 120 is an example of a dwelling or residence of a person or group that may use any number of communications services.
  • the home 120 is shown as a residence in the illustrated example, however, the home 120 may also be an office, business, or other structure wired or otherwise suitably equipped to provide telephone, data, and other communication services to one or more customers.
  • the home 114 is equipped with multiple communication devices, including home telephones 122 and 124 and client 126 .
  • the home telephones 122 and 124 may be standard devices that provide dialing and voice conversation capabilities.
  • Home telephone 122 may be integrated in any number of other devices or may be used in different forms. For example, the home telephone 122 may be part of a refrigerator.
  • the home telephone 124 may be integrated with a personal computer, such as client 126 .
  • the communications services accessible from the home telephones 122 and 124 may include standard telephone service or VoIP telephone service.
  • the home telephones 122 and 124 may be VoIP telephones or may be standard telephones that include a modem and/or VoIP adapters for enabling VoIP communications.
  • the client 126 may be a personal computer for performing and executing programs and instructions and accessing the wired network 118 .
  • the client 126 may be any computing devices suitable for communicating with the wired network 118 .
  • the wired network 118 may be a fiber optic, cable, or telephone network or other wired network suitable for communication over a hard wired connection with the client 126 .
  • the home 120 may include a wireless router, adapter, switch, hub, or other suitable interface that allows the client 126 to communicate with the wired network 118 .
  • the MSC 102 and local exchange 104 may use a graphical user interface (GUI), such as website or program accessible from the client 126 in order to enter and receive input preferences for a preferred caller list or other preferences applicable to call gating.
  • GUI graphical user interface
  • the user may stipulate identifiers for callers on a preferred caller list, provide user input, or receive a call or communicate using devices, such as wireless devices 112 and 114 , home telephones 122 and 124 , and client 126 .
  • devices such as wireless devices 112 and 114 , home telephones 122 and 124 , and client 126 .
  • a user may select to enable, order, initiate, configure, reconfigure or otherwise establish call gating and communications parameters as herein described.
  • the user may activate the preferred caller list in a number of ways.
  • the user may use a command that informs a function trigger of a device or the device itself, such as the MSC 102 , local exchange 104 , voicemail systems 105 and 106 , wireless device 112 and 114 , home telephones 122 and 124 , or client 126 , to filter or restrict the calls or communications that may be received.
  • the user may submit a command to activate the preferred caller list by dialing *2 on the home telephone 122 .
  • the command may also be a password, voice activated, time activated, preset by user selection or any other suitable option, setting, command, or user input.
  • the user may have established multiple preferred caller lists with different callers that may be activated using separate commands.
  • the applicable communications device may initiate call gating thereby activating the preferred caller list using any number of conditional criteria.
  • the conditional criteria may be stored in user preferences, logic, or integrated as part of the preferred caller list.
  • the conditional criteria may specify days, times of the day, locations, events, telephone settings or configurations, or other information that triggers activation of call gating for one or more specified devices.
  • the day and time may detail a specified time period for activating the call gating feature.
  • the location may be determined based on the equipment or registry where a wireless device is being utilized or using any number of global positioning or radio triangulation methods.
  • conditional criteria may be established for each of the user's communications devices so that a user's home telephone implements call gating on the weekend using a first preferred caller list and the user's wireless device implements call gating using a second preferred caller list.
  • a set of conditional criteria may be set for each of the communications devices, preferred caller lists, or applicable users of communications services.
  • a communications device may activate one of a set of preferred caller lists based on location.
  • a first preferred caller list may be activated for the user's wireless device
  • a second preferred caller list may be implement.
  • the functions of the preferred caller list may be implemented automatically based on the pre-set conditions that the user may establish using any number of interface devices.
  • a communications device may implement a preferred caller list based on a determination that the user is in a meeting.
  • the communications device may have access to the user's electronic calendar and based on a determination the user is in a meeting a preferred caller list designated for meetings may be activated.
  • the user may utilize multiple communications device and one may set to forward calls or communications from a first device to a second device.
  • a preferred caller list for call forwarding may be activated when the first device is set to forward to the secondary device for ensuring that only desired callers are able to reach the user despite the implementation of the call forwarding.
  • FIG. 2 shows examples of communications devices in accordance with the illustrative embodiments of the present invention.
  • FIG. 2 includes a standard telephone 202 , a cordless telephone 204 , and a wireless device 205 .
  • the standard telephone 202 , the cordless telephone 204 , and wireless device 205 may include a gating button 206 .
  • the standard telephone 202 and cordless telephone 204 are particular implementations of the standard telephone 122 of FIG. 1 .
  • the wireless device 205 is a particular implementation of the wireless device 114 of FIG. 1 .
  • the gating button 206 may be an interface that allows the user to send a signal or call gating command to a class 5 switch, MSC, or other communications device for activating call gating to the applicable device.
  • the gating button 206 may be a graphical user interface, touch screen, voice command, scroll wheel, or other input device that generates the command signal to implement call gating when pressed, selected, or otherwise activated.
  • the gating button 206 may implement a feature within the standard telephone 202 , cordless telephone 204 , or the wireless device 205 .
  • the gating button 206 may send a signal to an externally connected device, such as a class 5 switch, MSC, or server to activate the preferred caller list.
  • the standard telephone 202 and cordless telephone 204 are telephones that operate in conjunction with a publicly switched network and class 5 switch.
  • the communication service accessible from the standard telephone 202 and the cordless telephone 204 may be part of a voice over Internet protocol (VoIP) telephone service.
  • VoIP voice over Internet protocol
  • the standard telephone 202 and cordless telephone 204 are provided dial tone through a wired connection to a home, business or other location in which the standard telephone 202 and cordless telephone 204 are located.
  • the wireless device 205 may work in connection with one or more wireless networks.
  • FIG. 3 is a block diagram of an interfacing system for setting a preferred caller list in accordance with an illustrative embodiment.
  • FIG. 3 illustrates an embodiment of an interfacing system 300 .
  • the interfacing system 300 may include various hardware and software elements which may include a website 302 , and a server 304 .
  • the server 304 may include a user interface 306 , logic 308 , and a preferred caller list 310 .
  • the server 304 may be a particular implementation of the communications or computing devices of the communication system 100 of FIG. 1 . Configurations of the server 304 received from the website 302 may be applicable to both wireless and hard-wired networks.
  • the components of the server 304 may also be part of a communications device, such as a cell phone, to implement call gating locally for the user.
  • the preferences of the logic 308 and preferred caller list 310 may be periodically transmitted to the applicable communications device.
  • call gating may be implemented for a VoIP work phone and a personal cellular telephone of the user by entering a single command.
  • the user may set preferences to activate the preferred caller list 310 for specified communications devices.
  • the website 302 is a particular implementation of an interface that may be displayed by a remote client, wireless device, or other device to a user.
  • the website 302 may be generated or displayed by the user interface 306 .
  • the user interface 306 may manage input and feedback received from the user through the website 302 .
  • user input received through the website 302 and user interface 306 may be used by the logic 308 to activate the preferred caller list 310 .
  • the user may enter a password, such as PCL on the website or a numeric code such as *111 to activate the preferred caller list 310 for one or more communications devices.
  • the website 302 may also be used to receive conditional criteria for initiating, implementing and terminating call gating.
  • the logic 308 represents digital logic, instructions, or a module that limit communications to a device based on the preferred caller list 310 .
  • the logic 308 may any software or hardware construct including fully programmable gate arrays (FPGA) suitable to implement the features of the illustrative embodiments.
  • the logic 308 may be configured to determine an identifier associated with the caller.
  • the logic 308 may extract a phone number, caller identification information, a user name, IP address or other information to compare that information with the identifiers listed on the preferred caller list 310 .
  • the preferred caller list 310 or list is a data file listing the callers that are allowed to contact the caller when call gating is activated.
  • the preferred caller list 310 may be any document, spreadsheet, instructions, fields, or information that stores the information regarding callers and identifiers associated with each of the callers.
  • the preferred caller list 310 may include identifiers for communications devices used by family, friends, managers, or other individuals from which the user prefers to receive communications under any circumstance. Activation of call gating is transparent to callers identified by the preferred caller list 310 because their call is processed and connected as would normally occur.
  • the logic 308 may also be configured to receive feedback from a user during a communication to classify the communication as an emergency. For example, when a caller makes a phone call to the user, the logic 308 may be unable to associate an identifier of the caller with identifiers listed on the preferred caller list 310 . The normal result would be for the call to be connected to voicemail or ended. However, the logic 308 may ensure that a message is played to the caller to determine whether the call is an emergency. If the caller self-identifies an emergency situation, then the call is classified an emergency and the logic 308 may allow the call to proceed normally for connection to the user.
  • the logic 308 may be configured to queue, archive or otherwise store incoming communications, such as test, chat, email, and voicemail messages, from callers that are not listed on the preferred caller list 310 , until the user deactivates the preferred caller list or disables the call gating feature.
  • incoming communications such as test, chat, email, and voicemail messages
  • the logic 308 may also store and implement conditional criteria and user preferences that control how, when, where, and for which devices and preferred caller lists, call gating is utilized. For example, the logic 308 may ensure that call gating occurs on a wireless device only when the user is within a specified location or geographic range. In another example, call gating may be implemented on the user's home phone only on weekends and federal holidays.
  • FIG. 4 is a flowchart of a process for receiving a preferred caller list in accordance with an illustrative embodiment. The process of FIG. 4 may be implemented by a user utilizing a wireless device, remote client, or other communications or computing device.
  • the process may begin with the user accessing the website (step 402 ).
  • the user may also be required to select an icon, enter a website of the communications service provider, or open an application.
  • the user provides a secure identifier (step 404 ).
  • the secure identifier may be a username, password, account number, or other information to identify the user.
  • the user enters callers and identifiers for a preferred caller list (step 406 ).
  • the user may enter the name of the caller and identifiers, such as a phone number associated with each caller.
  • the user may select the caller from a call history or caller identification information to include that caller on the preferred caller list. For example, by selecting the caller identification information, the user may select a caller's name and IP address as the relevant identifiers to be associated with the caller in the preferred caller list.
  • the user may have any number of preferred caller lists.
  • the user may store a preferred caller list that is applicable to situations in which the user is at work, home, or school.
  • the preferred caller lists may be centrally stored for any number of communications devices.
  • the preferred caller list or a master list may be regularly accessed and managed using a VoIP telephone service, but may similarly be applicable for the user's cell phone.
  • FIG. 5 is a flowchart of a process for implementing a preferred caller list in accordance with an illustrative embodiment.
  • the process of FIG. 5 may be implemented by a wireless device, MSC, class 5 switch, server, or other component or device of a communications network.
  • the call gating feature or function may have previously been implemented to activate the preferred caller list based on manual user input or automated criteria pre-established by the user.
  • the process may begin by receiving a call (step 502 ).
  • the call is intercepted before the applicable communications device rings or otherwise alerts the user that the call is incoming.
  • the wireless device retrieves an identifier associated with the caller (step 504 ).
  • the identifier may be retrieved using caller identification information or by electronically scanning or searching the control information used to make the call.
  • the wireless device may retrieve any number of identifiers based on the call or communication.
  • the wireless device determines whether the identifier is on a preferred caller list (step 506 ). The determination of step 506 is made by comparing the one or more identifiers retrieved in step 504 and comparing the identifiers with the preferred caller list.
  • the wireless device connects the call to the user (step 508 ).
  • the call is connected to the user because the user has previously established that the caller is authorized to contact the user under the circumstances.
  • the wireless device determines whether the call is an emergency (step 510 ). The determination of step 510 may be made based on input from the user. For example, a voice or text prompt may ask “Is this call an emergency? If yes, press 9, if no, press 1.” The determination may then be made based on the numeric input form the user. If the wireless device determines the call is not an emergency, the wireless device connects the call to the user's voicemail (step 512 ). The call is passed to the voicemail so that the user may retrieve messages at the user's discretion.
  • the call may be terminated, played a pre-recorded message, or otherwise processed in response to determining the identifier is not included on the list. If the wireless device determines the call is an emergency in step 510 , the wireless device connects the call to the user (step 508 ).
  • FIG. 6 is a graphical user interface for controlling a preferred caller list in accordance with an illustrative embodiment.
  • the graphical user interface 600 is one embodiment of an interface that may be accessible to a user.
  • the graphical user interface 600 may include any number of elements or components including a username 602 , password 604 , customer code 606 , add identifier designator 608 , category 610 , caller 612 , name 614 , and conditional criteria 616 .
  • the graphical user interface 600 may be displayed to a user using a remote client or wireless device 114 , both of FIG. 1 .
  • the graphical user interface 600 may be used to display and manage a preferred caller list and preferences associated with a call gating feature.
  • the graphical user interface 600 may also be part of an interactive message, such as an email message, SMS message, printout, or information otherwise electronically available to the user.
  • the graphical user interface 600 may be displayed to the user only if the user has signed up for or subscribed to a call gating or preferred caller list feature.
  • the features of the graphical user interface 600 may provide a method of managing incoming communications and limiting those communications to communications that are deemed acceptable through the selected preferences. As a result, the user may have greater peace from unwanted or unnecessary communications and increased ability to focus on other projects, tasks, and activities.
  • the graphical user interface 600 may be part of a web browsing application with content populated by a communications service provider such as website 302 of FIG. 3 .
  • the graphical user interface 600 may be printed in the form of a preferred caller list that may be sent to the user monthly with other invoice information.
  • the graphical user interface 600 may also be integrated in an email that is sent to the user at the end of a billing cycle.
  • the user name 602 , password 604 and customer code 606 may be used by a website or authentication system to determine whether a user may access the graphical user interface 600 .
  • the customer code 606 may be the code provided to bill calls and access the account.
  • the graphical user interface 600 may be used to configure the preferred caller list, manage preferences or otherwise allow interaction between the user and the devices and services of the communications service provider.
  • the add identifier designator 608 may be used to add new identifiers for each potential caller.
  • the identifiers may include any number of pre-set identifiers including phone numbers IP addresses, area codes, usernames, email addresses, and other identifiers, fields or criteria.
  • the add identifier designator 608 , category 610 , caller 612 , and name 614 may include pre-set information or data and information that is extracted from the applicable communications device or communication history. Alternatively, the fields of the graphical user interface 600 may be customized or user entered to fit the needs of the user.
  • the category 610 may be an optional designator that may specify the applicable use of the identifier and may be information that is used and reviewed by the user for organizing the preferred caller list.
  • the caller 612 lists the applicable identifier. A number of identifiers may be listed for each caller 612 . For example, the user may want family members to be able to call or communicate regardless of whether they are calling from their cell phones, work phones, or home phones and as a result each separate identifier may be entered.
  • the name 614 may allow a user to specify a name or other indication of the caller's name. The name 614 may also be extracted from caller identification information based on the identifier entered as the caller 612 .
  • the user may also be able to disable or enable a feature that enables a communication to be connected to the user if it is determined to be an emergency.
  • the user may record a prompt.
  • the user may implement an emergency feature that may be used by individuals that have received the code from the user.
  • the conditional criteria 616 may include additional details for initiating and implementing the call gating feature.
  • the conditional criteria 616 may specify preferences for one or more preferred caller lists, devices for which the lists are activated, and times, locations, and events that trigger activation or deactivation as previously described.

Abstract

A wireless device, system, and method configured to limit communications. The server includes a processor for executing a set of instructions and a memory for storing the set of instructions. The set of instructions are executed to receive a list of one or more communicating parties that are authorized to communicate with a user at any time, receive a selection to limit communications, determine whether an identifier associated with a communicating party is in the list in response to processing a communication, and connect the communication to a communications device in response to determining the identifier is in the list.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a Continuation of U.S. patent application Ser. No. 13/525,914 filed Jun. 18, 2012, entitled METHOD AND SYSTEM FOR CONDITIONALLY LIMITING COMMUNICATIONS, which is a Continuation of U.S. patent application Ser. No. 12/002,422 filed Dec. 17, 2007, entitled METHOD AND SYSTEM FOR CALL GATING, now U.S. Pat. No. 8,229,404 issued Jul. 24, 2012, the entire teachings of which are incorporated herein.
BACKGROUND
The use and development of communications has grown nearly exponentially in recent years. The growth is fueled by larger wired and wireless networks with more reliable protocols and better communications hardware available to both service providers and consumers. Based on these drastic improvements, users have nearly unlimited access to communications. In many cases, the different forms of electronic communications may begin to monopolize a user's time, preventing him or her from accomplishing other tasks, projects, goals, and work in which the user is involved.
Many users resort to turning off or ignoring their phone or other communications devices. In other cases, the user may use a service or feature, such as do-not-disturb. Unfortunately, such solutions are over encompassing, preventing the user from receiving communications, such as critical or emergency information, they would have received regardless of their present workload or status. As a result, users are forced to either broadly ignore communications with the potential of missing important information or review each incoming call to determine the relative importance at the expense of time and effort.
SUMMARY
One embodiment provides a wireless device, system, and method configured to limit communications. The wireless device may include a processor for executing a set of instructions and a memory for storing the set of instructions. The set of instructions may be executed to receive a list of one or more communicating parties that are authorized to communicate with a user at any time, receive a selection to limit communications, determine whether an identifier associated with a communicating party is in the list in response to processing a communication, and connect the communication to the wireless device in response to determining the identifier is in the list.
Another embodiment provides a method for limiting communications. A list of one or more communicating parties that are authorized to communicate with a user at any time may be received. A selection to limit communications may be received. An identifier associated with a communicating party may be determined to be on the list in response to receiving a communication. The communication may be connected to a communications device in response to determining the identifier is on the list.
Another embodiment may provide a communication system for limiting communications include a communication system for call gating. The communication system may include a server configured to receive incoming communications from a communications network. The server may also include logic configured to receive a list of one or more communicating parties that are authorized to communicate with a user at any time, receive a selection to limit communications, determine whether an identifier associated with a communicating party is in the list in response to processing a communication, reject the communication in response to conditional criteria set by the user and determining the identifier is not on the list; and connect the communication to a communications device in response to determining the identifier is in the list. The communications device in communication with the server may be configured to receive at least a portion of the communications from the server.
BRIEF DESCRIPTION OF THE DRAWINGS
Illustrative embodiments of the present invention are described in detail below with reference to the attached drawing figures, which are incorporated by reference herein and wherein:
FIG. 1 is a pictorial representation of a communications system in accordance with an illustrative embodiment;
FIG. 2 shows examples of communications devices in accordance with the illustrative embodiments of the present invention;
FIG. 3 is a block diagram of an interfacing system for setting a preferred caller list in accordance with an illustrative embodiment;
FIG. 4 is a flowchart of a process for receiving a preferred caller list in accordance with an illustrative embodiment;
FIG. 5 is a flowchart of a process for implementing a preferred caller list in accordance with an illustrative embodiment; and
FIG. 6 is a graphical user interface for controlling a preferred caller list in accordance with an illustrative embodiment.
DETAILED DESCRIPTION OF THE DRAWINGS
Illustrative embodiments provide a system and method for call gating. A user may establish a number of individuals or devices that are allowed to call or communicate with a user. The callers are saved in one or more lists. Each caller may be associated with one or more identifiers that allow the caller to communicate with the user. The identifiers may include phone numbers, caller identification information, user names, nicknames, email addresses or other information used for purposes of communication. The user may select to limit incoming communications to those individuals on the preferred caller list by entering a code or providing other input to a communications device, such as a cell phone. Once activated, all calls that are received from callers not included on the list are connected to voicemail or handled according to other instructions of the user.
In one embodiment, the caller may be prompted to provide input specifying that the communication is an emergency for ensuring that the caller is able to reach the user during an emergency. For example, a voice prompt may prompt a caller to enter a numeric code if the telephone call is an emergency, thereby allowing the call to be connected to the user. The illustrative embodiments allow a user to limit the calls received at will to avoid unnecessary communications and to encouraging better productivity at the user's request.
FIG. 1 is a pictorial representation of a communications system in accordance with an illustrative embodiment. The communication system 100 of FIG. 1 includes various elements used for wireless and wired communication. The communications system 100 includes a mobile switching center 102, a local exchange 104, voicemail systems 106 and 108, a database 110, wireless devices 112 and 114, a transmission tower 116, a wired network 118, a home 120, home telephones 122 and 124, and a client 126. In one embodiment, the different elements and components of the communications system 100 communicate using wireless communications including satellite connections or hardwired connections, such as fiber optics, T1, cable, DSL, high speed trunks, and telephone lines.
The wireless devices 112 and 114 may communicate with the transmission tower 116 using communications protocols, such as time division multiple access (TDMA), code division multiple access (CDMA), global systems for mobile (GSM) communications, personal communications systems (PCS), WLAN, WiMAX, or other frequently used cellular and data communications protocols and standards. The wireless devices 112 and 114 may include cellular phones, Blackberry®, personal digital assistances (PDA), laptops, evolution data optimized (EDO) cards, multi-mode devices, and other wireless communication devices and elements.
Communications within the communications system 100 may occur on any number of networks which may include wireless networks, data or packet networks, private networks, publicly switched telephone networks (PSTN), and the wired network 118. The networks of the communications system 100 may represent a single communication service provider or multiple communications services providers. The features of the embodiments may be implemented by one or more elements of the communications system 100 independently or as a networked implementation.
In one embodiment, the mobile switching center 102, voicemail system 106, and transmission tower 116 are part of a wireless network that is operated by a wireless service provider. For example, the control signals and operational features may be performed by the mobile switching center 102 and the wireless signals may be broadcast from the transmission tower 116 to the wireless devices 112 and 114. The wireless network may include any number of systems, towers, servers, and other network and communications devices for implementing the features and performing the methods herein described.
The mobile switching center (MSC) 102 may be a switch used for wireless call control and processing. The MSC 102 may also serve as a point of access to the local exchange 104. The MSC 102 is a telephone exchange that provides circuit switched calling and mobility management and may also provide GSM or PCS services to the wireless devices 112 and 114 located within the area the MSC 102 serves. The MSC 102 may include a home locator record (HLR) and virtual locator record (VLR) that may be used to implement different features of the illustrative embodiments. The voicemail system 106 may be an integrated part of the MSC 102 or alternatively may be an externally connected device.
In one embodiment, the voicemail system 106 may include an integrated database for storing customer and usage information and data. In another embodiment, the voicemail system 106, a server, or other intelligent network device may store user preferences and implement the call gating, as further described herein. The user may interact or send and receive data, information, and commands through the telephones 122 and 124, wireless device 112 and 114, or the client 126. The mobile switching center 102 and voicemail system 106 may include any number of hardware and software components. In one embodiment, the MSC 106 is an advanced intelligence network device with software modules equipped to perform call gating features and functions.
The local exchange 104 and MSC 102 communicate using a signal control protocol, such as a signaling system number 7 (SS7) protocol. The SS7 protocol is used in publicly switched networks for establishing connections between switches, performing out-of-band signaling in support of the call-establishment, billing, routing, and implementing information-exchange functions of the publicly switched network 134. The local exchange 104 may be owned and operated by a local exchange carrier that provides standard telephone service to any number of users. In one embodiment, the local exchange 104 may be a class 5 switch that is part of the network systems of the local carrier. The local exchange 104 may include or may be connected to the voicemail system 106. However, the local exchange 104 may also be a Digital Subscriber Line Access Multiplexer (DSLAM), Internet Protocol (IP) gateway, base station, or any other suitable network access point.
The local exchange 104 may be a wire-line switch or public exchange using time domain multiplexing to provide telecommunications services to a particular subscriber or groups of subscribers. The local exchange 104 may be located at a local telephone company's central office, or at a business location serving as a private branch exchange. The local exchange 104 may provide dial-tone, calling features, and additional digital and data services to subscribers, such as home phones 122 and 124. The local exchange 104 may also enable VoIP communication of the home telephones 116 and 118 through a data network. VoIP works by sending voice information in digital form in packets, rather than in the traditional circuit-committed protocols of the publicly switched network.
The communications system 100 may further include any number of hardware and software elements that may not be shown in the example of FIG. 1. For example, in order to facilitate VoIP communications, the communications system and the MSC 102 and local exchange 104 in particular, may include application servers, media servers, service brokers, call agents, edge routers, gateways (signaling, trunking, access, sub, etc.), IP network service providers, adapters, exchanges, switches, users, and networks. The voicemail system 108 is similar to the voicemail system 106 except that it is equipped to handle voicemail for landline customers rather than wireless customers. The local exchange 104 or other components of a wire line network, such as a data, PSTN, VoIP, or other wired network may implement the call gating features and perform the methods herein described.
The MSC 102 and the local exchange 104 may include an authentication space. The authentication space may be a partition of the server or other storage designated by the communications service provider. The authentication space may validate that a user or device, such as client 126, is allowed to authorize the MSC 102, local exchange 104, or corresponding voicemail system 106 and 108 to set preferences, implement changes, review information, or perform other updates. For example, a user may be first required to provide a secure identifier, such as a user name, password, or other authentication code or hardware interface, to verify the user is authorized to make changes within the authentication space.
The authentication information may be used to create a secure connection between the client and the MSC 102 and the local exchange 104. The secure connection may be a virtual private network tunnel, an encrypted connection, firewall, or other form of secured communications link. The MSC 102 and local exchange 104 may use any number of gateways, proxies, applications, or interfaces for allowing the client 126 to the MSC 102 and local exchange 104 through the wired network 118. Alternatively, the client 126 may use a wireless network or other network to access the MSC 102 and local exchange 104. The MSC 102 and local exchange 104 may use a host client application for communicating with numerous clients.
The home 120 is an example of a dwelling or residence of a person or group that may use any number of communications services. The home 120 is shown as a residence in the illustrated example, however, the home 120 may also be an office, business, or other structure wired or otherwise suitably equipped to provide telephone, data, and other communication services to one or more customers. In one embodiment, the home 114 is equipped with multiple communication devices, including home telephones 122 and 124 and client 126. The home telephones 122 and 124 may be standard devices that provide dialing and voice conversation capabilities. Home telephone 122 may be integrated in any number of other devices or may be used in different forms. For example, the home telephone 122 may be part of a refrigerator. In another embodiment, the home telephone 124 may be integrated with a personal computer, such as client 126. The communications services accessible from the home telephones 122 and 124 may include standard telephone service or VoIP telephone service. The home telephones 122 and 124 may be VoIP telephones or may be standard telephones that include a modem and/or VoIP adapters for enabling VoIP communications.
The client 126 may be a personal computer for performing and executing programs and instructions and accessing the wired network 118. However, the client 126 may be any computing devices suitable for communicating with the wired network 118. The wired network 118 may be a fiber optic, cable, or telephone network or other wired network suitable for communication over a hard wired connection with the client 126. In one embodiment, the home 120 may include a wireless router, adapter, switch, hub, or other suitable interface that allows the client 126 to communicate with the wired network 118. The MSC 102 and local exchange 104 may use a graphical user interface (GUI), such as website or program accessible from the client 126 in order to enter and receive input preferences for a preferred caller list or other preferences applicable to call gating.
In an illustrative embodiment, the user may stipulate identifiers for callers on a preferred caller list, provide user input, or receive a call or communicate using devices, such as wireless devices 112 and 114, home telephones 122 and 124, and client 126. At any time, a user may select to enable, order, initiate, configure, reconfigure or otherwise establish call gating and communications parameters as herein described.
The user may activate the preferred caller list in a number of ways. For example, the user may use a command that informs a function trigger of a device or the device itself, such as the MSC 102, local exchange 104, voicemail systems 105 and 106, wireless device 112 and 114, home telephones 122 and 124, or client 126, to filter or restrict the calls or communications that may be received. In one example, the user may submit a command to activate the preferred caller list by dialing *2 on the home telephone 122. The command may also be a password, voice activated, time activated, preset by user selection or any other suitable option, setting, command, or user input. In one embodiment, the user may have established multiple preferred caller lists with different callers that may be activated using separate commands.
In one embodiment, the applicable communications device may initiate call gating thereby activating the preferred caller list using any number of conditional criteria. The conditional criteria may be stored in user preferences, logic, or integrated as part of the preferred caller list. In one embodiment, the conditional criteria may specify days, times of the day, locations, events, telephone settings or configurations, or other information that triggers activation of call gating for one or more specified devices. The day and time may detail a specified time period for activating the call gating feature. The location may be determined based on the equipment or registry where a wireless device is being utilized or using any number of global positioning or radio triangulation methods. For example, conditional criteria may be established for each of the user's communications devices so that a user's home telephone implements call gating on the weekend using a first preferred caller list and the user's wireless device implements call gating using a second preferred caller list.
A set of conditional criteria may be set for each of the communications devices, preferred caller lists, or applicable users of communications services. In another example, a communications device may activate one of a set of preferred caller lists based on location. As a result, when it is determined that the user is at work or the vicinity of work a first preferred caller list may be activated for the user's wireless device, when it is determined that the user is at home a second preferred caller list may be implement. The functions of the preferred caller list may be implemented automatically based on the pre-set conditions that the user may establish using any number of interface devices.
In another example, a communications device may implement a preferred caller list based on a determination that the user is in a meeting. For example, the communications device may have access to the user's electronic calendar and based on a determination the user is in a meeting a preferred caller list designated for meetings may be activated. In another embodiment, the user may utilize multiple communications device and one may set to forward calls or communications from a first device to a second device. A preferred caller list for call forwarding may be activated when the first device is set to forward to the secondary device for ensuring that only desired callers are able to reach the user despite the implementation of the call forwarding.
FIG. 2 shows examples of communications devices in accordance with the illustrative embodiments of the present invention. FIG. 2 includes a standard telephone 202, a cordless telephone 204, and a wireless device 205. The standard telephone 202, the cordless telephone 204, and wireless device 205 may include a gating button 206. The standard telephone 202 and cordless telephone 204 are particular implementations of the standard telephone 122 of FIG. 1. The wireless device 205 is a particular implementation of the wireless device 114 of FIG. 1.
The gating button 206 may be an interface that allows the user to send a signal or call gating command to a class 5 switch, MSC, or other communications device for activating call gating to the applicable device. The gating button 206 may be a graphical user interface, touch screen, voice command, scroll wheel, or other input device that generates the command signal to implement call gating when pressed, selected, or otherwise activated. The gating button 206 may implement a feature within the standard telephone 202, cordless telephone 204, or the wireless device 205. Alternatively, the gating button 206 may send a signal to an externally connected device, such as a class 5 switch, MSC, or server to activate the preferred caller list.
The standard telephone 202 and cordless telephone 204 are telephones that operate in conjunction with a publicly switched network and class 5 switch. In another embodiment, the communication service accessible from the standard telephone 202 and the cordless telephone 204 may be part of a voice over Internet protocol (VoIP) telephone service. The standard telephone 202 and cordless telephone 204 are provided dial tone through a wired connection to a home, business or other location in which the standard telephone 202 and cordless telephone 204 are located. The wireless device 205 may work in connection with one or more wireless networks.
FIG. 3 is a block diagram of an interfacing system for setting a preferred caller list in accordance with an illustrative embodiment. FIG. 3 illustrates an embodiment of an interfacing system 300. The interfacing system 300 may include various hardware and software elements which may include a website 302, and a server 304. The server 304 may include a user interface 306, logic 308, and a preferred caller list 310.
The server 304 may be a particular implementation of the communications or computing devices of the communication system 100 of FIG. 1. Configurations of the server 304 received from the website 302 may be applicable to both wireless and hard-wired networks. The components of the server 304 may also be part of a communications device, such as a cell phone, to implement call gating locally for the user. In one embodiment, the preferences of the logic 308 and preferred caller list 310 may be periodically transmitted to the applicable communications device. In one embodiment, call gating may be implemented for a VoIP work phone and a personal cellular telephone of the user by entering a single command. Similarly, the user may set preferences to activate the preferred caller list 310 for specified communications devices.
The website 302 is a particular implementation of an interface that may be displayed by a remote client, wireless device, or other device to a user. The website 302 may be generated or displayed by the user interface 306. The user interface 306 may manage input and feedback received from the user through the website 302. In one embodiment, user input received through the website 302 and user interface 306 may be used by the logic 308 to activate the preferred caller list 310. For example, the user may enter a password, such as PCL on the website or a numeric code such as *111 to activate the preferred caller list 310 for one or more communications devices. The website 302 may also be used to receive conditional criteria for initiating, implementing and terminating call gating.
The logic 308 represents digital logic, instructions, or a module that limit communications to a device based on the preferred caller list 310. However, the logic 308 may any software or hardware construct including fully programmable gate arrays (FPGA) suitable to implement the features of the illustrative embodiments.
The logic 308 may be configured to determine an identifier associated with the caller. The logic 308 may extract a phone number, caller identification information, a user name, IP address or other information to compare that information with the identifiers listed on the preferred caller list 310. The preferred caller list 310 or list is a data file listing the callers that are allowed to contact the caller when call gating is activated. However, the preferred caller list 310 may be any document, spreadsheet, instructions, fields, or information that stores the information regarding callers and identifiers associated with each of the callers. The preferred caller list 310 may include identifiers for communications devices used by family, friends, managers, or other individuals from which the user prefers to receive communications under any circumstance. Activation of call gating is transparent to callers identified by the preferred caller list 310 because their call is processed and connected as would normally occur.
The logic 308 may also be configured to receive feedback from a user during a communication to classify the communication as an emergency. For example, when a caller makes a phone call to the user, the logic 308 may be unable to associate an identifier of the caller with identifiers listed on the preferred caller list 310. The normal result would be for the call to be connected to voicemail or ended. However, the logic 308 may ensure that a message is played to the caller to determine whether the call is an emergency. If the caller self-identifies an emergency situation, then the call is classified an emergency and the logic 308 may allow the call to proceed normally for connection to the user.
The logic 308 may be configured to queue, archive or otherwise store incoming communications, such as test, chat, email, and voicemail messages, from callers that are not listed on the preferred caller list 310, until the user deactivates the preferred caller list or disables the call gating feature. As a result, the user's privacy is enhanced because the user is not bothered or interrupted by incoming communications that do not meet the criteria specified by the preferred caller list 310. Similarly, the user is not require to take the time and effort required to screen communications as they are incoming based on the preset preferences of the logic 308. The logic 308 may also store and implement conditional criteria and user preferences that control how, when, where, and for which devices and preferred caller lists, call gating is utilized. For example, the logic 308 may ensure that call gating occurs on a wireless device only when the user is within a specified location or geographic range. In another example, call gating may be implemented on the user's home phone only on weekends and federal holidays.
FIG. 4 is a flowchart of a process for receiving a preferred caller list in accordance with an illustrative embodiment. The process of FIG. 4 may be implemented by a user utilizing a wireless device, remote client, or other communications or computing device.
The process may begin with the user accessing the website (step 402). The user may also be required to select an icon, enter a website of the communications service provider, or open an application. The user provides a secure identifier (step 404). The secure identifier may be a username, password, account number, or other information to identify the user.
Next, the user enters callers and identifiers for a preferred caller list (step 406). In one embodiment, the user may enter the name of the caller and identifiers, such as a phone number associated with each caller. Alternatively, the user may select the caller from a call history or caller identification information to include that caller on the preferred caller list. For example, by selecting the caller identification information, the user may select a caller's name and IP address as the relevant identifiers to be associated with the caller in the preferred caller list.
The user may have any number of preferred caller lists. For example, the user may store a preferred caller list that is applicable to situations in which the user is at work, home, or school. The preferred caller lists may be centrally stored for any number of communications devices. For example, the preferred caller list or a master list may be regularly accessed and managed using a VoIP telephone service, but may similarly be applicable for the user's cell phone.
FIG. 5 is a flowchart of a process for implementing a preferred caller list in accordance with an illustrative embodiment. The process of FIG. 5 may be implemented by a wireless device, MSC, class 5 switch, server, or other component or device of a communications network. The call gating feature or function may have previously been implemented to activate the preferred caller list based on manual user input or automated criteria pre-established by the user. The process may begin by receiving a call (step 502). The call is intercepted before the applicable communications device rings or otherwise alerts the user that the call is incoming.
Next, the wireless device retrieves an identifier associated with the caller (step 504). The identifier may be retrieved using caller identification information or by electronically scanning or searching the control information used to make the call. The wireless device may retrieve any number of identifiers based on the call or communication. The wireless device determines whether the identifier is on a preferred caller list (step 506). The determination of step 506 is made by comparing the one or more identifiers retrieved in step 504 and comparing the identifiers with the preferred caller list.
If the wireless device determines the identifier is on the preferred caller list, the wireless device connects the call to the user (step 508). The call is connected to the user because the user has previously established that the caller is authorized to contact the user under the circumstances.
If the wireless device determines the identifier is not included on the preferred caller list in step 506, the wireless device determines whether the call is an emergency (step 510). The determination of step 510 may be made based on input from the user. For example, a voice or text prompt may ask “Is this call an emergency? If yes, press 9, if no, press 1.” The determination may then be made based on the numeric input form the user. If the wireless device determines the call is not an emergency, the wireless device connects the call to the user's voicemail (step 512). The call is passed to the voicemail so that the user may retrieve messages at the user's discretion. In another embodiment, the call may be terminated, played a pre-recorded message, or otherwise processed in response to determining the identifier is not included on the list. If the wireless device determines the call is an emergency in step 510, the wireless device connects the call to the user (step 508).
FIG. 6 is a graphical user interface for controlling a preferred caller list in accordance with an illustrative embodiment. The graphical user interface 600 is one embodiment of an interface that may be accessible to a user. The graphical user interface 600 may include any number of elements or components including a username 602, password 604, customer code 606, add identifier designator 608, category 610, caller 612, name 614, and conditional criteria 616. The graphical user interface 600 may be displayed to a user using a remote client or wireless device 114, both of FIG. 1.
The graphical user interface 600 may be used to display and manage a preferred caller list and preferences associated with a call gating feature. The graphical user interface 600 may also be part of an interactive message, such as an email message, SMS message, printout, or information otherwise electronically available to the user.
In one embodiment, the graphical user interface 600 may be displayed to the user only if the user has signed up for or subscribed to a call gating or preferred caller list feature. The features of the graphical user interface 600 may provide a method of managing incoming communications and limiting those communications to communications that are deemed acceptable through the selected preferences. As a result, the user may have greater peace from unwanted or unnecessary communications and increased ability to focus on other projects, tasks, and activities.
In one embodiment, the graphical user interface 600 may be part of a web browsing application with content populated by a communications service provider such as website 302 of FIG. 3. Alternatively, the graphical user interface 600 may be printed in the form of a preferred caller list that may be sent to the user monthly with other invoice information. The graphical user interface 600 may also be integrated in an email that is sent to the user at the end of a billing cycle.
The user name 602, password 604 and customer code 606 may be used by a website or authentication system to determine whether a user may access the graphical user interface 600. The customer code 606 may be the code provided to bill calls and access the account. The graphical user interface 600 may be used to configure the preferred caller list, manage preferences or otherwise allow interaction between the user and the devices and services of the communications service provider.
The add identifier designator 608 may be used to add new identifiers for each potential caller. The identifiers may include any number of pre-set identifiers including phone numbers IP addresses, area codes, usernames, email addresses, and other identifiers, fields or criteria. The add identifier designator 608, category 610, caller 612, and name 614 may include pre-set information or data and information that is extracted from the applicable communications device or communication history. Alternatively, the fields of the graphical user interface 600 may be customized or user entered to fit the needs of the user. The category 610 may be an optional designator that may specify the applicable use of the identifier and may be information that is used and reviewed by the user for organizing the preferred caller list.
The caller 612 lists the applicable identifier. A number of identifiers may be listed for each caller 612. For example, the user may want family members to be able to call or communicate regardless of whether they are calling from their cell phones, work phones, or home phones and as a result each separate identifier may be entered. The name 614 may allow a user to specify a name or other indication of the caller's name. The name 614 may also be extracted from caller identification information based on the identifier entered as the caller 612.
In one embodiment, the user may also be able to disable or enable a feature that enables a communication to be connected to the user if it is determined to be an emergency. For example, using the graphical user interface 600, the user may record a prompt. In another embodiment, the user may implement an emergency feature that may be used by individuals that have received the code from the user.
The conditional criteria 616 may include additional details for initiating and implementing the call gating feature. The conditional criteria 616 may specify preferences for one or more preferred caller lists, devices for which the lists are activated, and times, locations, and events that trigger activation or deactivation as previously described.
The previous detailed description is of a small number of embodiments for implementing the invention and is not intended to be limiting in scope. The following claims set forth a number of the embodiments of the invention disclosed with greater particularity.

Claims (19)

What is claimed:
1. A wireless device configured to limit communications, the device comprising:
a processor for executing a set of instructions;
a memory in communication with the processor for storing the set of instructions, wherein the set of instructions are executed to:
receive a list of one or more communicating parties that are authorized to communicate with the wireless device at any time;
receive a selection to limit communications;
determine whether an identifier associated with a communicating party is in the list in response to processing a communication;
connect the communication to a communications device in response to determining the identifier is in the list;
receive at least one preferred caller list that limits calls to the wireless device;
monitor an electronic calendar associated with a user of the wireless device; and
automatically enable a call gating feature using the at least one preferred caller list that limits calls to the wireless device in response to a determination that the user is in a meeting based on entries in the electronic calendar associated with the user of the wireless device.
2. The wireless device according to claim 1, wherein the list is saved in a database accessible to the wireless device.
3. The wireless device according to claim 1, wherein the database is accessible through a graphical user interface for managing the list.
4. The wireless device according to claim 1, wherein the set of instructions are integrated with a web browser that is remotely accessible by the user, wherein the web browser includes access information for verifying the identity of the user, and wherein the user associates one or more identifiers with each communicating party.
5. The wireless device according to claim 1, wherein the list is configured to include IP addresses, phone numbers, email addresses, user names, and communications identifiers, and wherein the list is communicated through an interactive message.
6. The wireless device according to claim 1, wherein the communication is connected in response to conditional criteria established by the user.
7. The wireless device according to claim 1, wherein the identifier is enabled to be entered by the user or automatically determined.
8. The wireless device according to claim 6, wherein the conditional criteria include at least conditions for automatically limiting communications utilizing days, times of day, locations, and specific events.
9. The wireless device according to claim 1, wherein the set of instructions are further executed to:
allow the communication in response to the communicating party affirmatively identifying the communication as an emergency communication even without determining the identifier is in the list.
10. A method for limiting communications, the method comprising:
receiving a list of one or more communicating parties that are authorized to communicate with a user at any time;
receiving a selection to limit communications;
determining whether an identifier associated with a communicating party is on the list in response to receiving a communication;
connecting the communication to a communications device in response to determining the identifier is on the list;
receiving at least one preferred caller list that limits calls to the wireless device;
monitoring an electronic calendar associated with a user of the wireless device; and
automatically enabling a call gating feature using the at least one preferred caller list that limits calls to the wireless device in response to a determination that the user is in a meeting based on entries in the electronic calendar associated with the user of the wireless device.
11. The method according to claim 10, further comprising:
determining whether the communication is an emergency; and
connecting the communication to the communication device in response to receiving an affirmative indication from the communicating party indicating the communication is an emergency.
12. The method according to claim 11, wherein the list includes a plurality of lists applicable for different distinct locations, wherein the different distinct locations includes a user's home location and a user's work location.
13. The method according to claim 12, wherein plurality of lists are managed utilizing an interactive website.
14. The method according to claim 10, wherein the identifier is enabled to be an IP address, a phone number, an email address, a user name, and a communications identifier.
15. The method according to claim 10, further comprising:
limiting the communication in response to user input from the user or conditional criteria pre-established by the user.
16. The method according to claim 15, wherein the conditional criteria include at least conditions for automatically limiting communications utilizing days, times of day, locations, and events.
17. A communication system for limiting communications, the system comprising:
a server configured to:
receive communications from a communications network, wherein the server includes logic configured to receive a list of one or more communicating parties that are authorized to communicate with a user at any time;
receive a selection to limit communications;
determine whether an identifier associated with a communicating party is in the list in response to processing a communication;
reject the communication in response to conditional criteria set by the user and determining the identifier is not on the list;
connect the communication to a communications device of the user in response to determining the identifier is in the list;
receive at least one preferred caller list that limits calls to the communications device;
monitor an electronic calendar associated with the user of the communications device; and
automatically enable a call gating feature using the at least one preferred caller list that limits calls to the communications device in response to a determination that the user is in a meeting based on entries in the electronic calendar associated with the user of the communications device.
18. The communication system according to claim 17, wherein logic prompts a user to affirmatively indicate whether the communication is an emergency, and wherein the communication is passed to the communications device in response to the user affirmatively indicating the communication is an emergency.
19. The communication system according to claim 17, wherein the list includes a plurality of lists applicable for different distinct locations.
US13/943,589 2007-12-17 2013-07-16 System and method for limiting communications Active US8750848B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/943,589 US8750848B2 (en) 2007-12-17 2013-07-16 System and method for limiting communications

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/002,422 US8229404B2 (en) 2007-12-17 2007-12-17 Method and system for call gating
US13/525,914 US8509752B2 (en) 2007-12-17 2012-06-18 Method and system for conditionally limiting communications
US13/943,589 US8750848B2 (en) 2007-12-17 2013-07-16 System and method for limiting communications

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/525,914 Continuation US8509752B2 (en) 2007-12-17 2012-06-18 Method and system for conditionally limiting communications

Publications (2)

Publication Number Publication Date
US20130295896A1 US20130295896A1 (en) 2013-11-07
US8750848B2 true US8750848B2 (en) 2014-06-10

Family

ID=40753933

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/002,422 Active 2030-09-24 US8229404B2 (en) 2007-12-17 2007-12-17 Method and system for call gating
US13/525,914 Active US8509752B2 (en) 2007-12-17 2012-06-18 Method and system for conditionally limiting communications
US13/943,589 Active US8750848B2 (en) 2007-12-17 2013-07-16 System and method for limiting communications

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/002,422 Active 2030-09-24 US8229404B2 (en) 2007-12-17 2007-12-17 Method and system for call gating
US13/525,914 Active US8509752B2 (en) 2007-12-17 2012-06-18 Method and system for conditionally limiting communications

Country Status (1)

Country Link
US (3) US8229404B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9066203B2 (en) 2009-03-05 2015-06-23 CenturyLink Intellectual Proprty LLC System and method for restricting communications at a network level

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8229404B2 (en) 2007-12-17 2012-07-24 Embarq Holdings Company, Llc Method and system for call gating
US8781508B1 (en) * 2008-11-25 2014-07-15 Brytelight Enterprises System and method for transferring information between a remote computing device and a central business unit
US7840226B1 (en) * 2009-12-29 2010-11-23 Oto Technologies, Llc Apparatus and method of location based telecommunication authorization
US9301112B2 (en) * 2013-08-13 2016-03-29 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Urgent call-back feature that locks-out non-urgent calls

Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6115602A (en) 1996-11-21 2000-09-05 At&T Corp. Method and system for call screening
US6115596A (en) 1997-04-22 2000-09-05 Ericsson Inc. Systems and methods for handling emergency calls in hierarchical cell structures
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US20030045279A1 (en) 2001-09-05 2003-03-06 Robert Shostak Voice-controlled wireless communications system and method
US20040030719A1 (en) 2002-02-13 2004-02-12 Jie Wei Web page based dynamic book for document presentation and operation
US20040101118A1 (en) * 2002-09-06 2004-05-27 Steven Powell Caller identification data management
US20040192272A1 (en) * 2003-03-26 2004-09-30 Samsung Electronics Co., Ltd. Method of starting an application program of a mobile terminal and method of providing service data in a mobile communication system
US20040210479A1 (en) * 1996-10-25 2004-10-21 Ipf, Inc. Internet-based brand marketing communication instrumentation network for deploying, installing and remotely programming brand-building server-side driven multi-mode virtual kiosks on the World Wide Web (WWW), and methods of brand marketing communication between brand marketers and consumers using the same
US20050233735A1 (en) * 2004-04-16 2005-10-20 Jeyhan Karaoguz Enhanced caller ID information based on access device information via a broadband access gateway
US20050255861A1 (en) * 2004-04-15 2005-11-17 Brian Wilson System for providing location-based services in a wireless network, such as locating sets of desired locations
US6975853B2 (en) 2002-10-22 2005-12-13 Mitsubishi Electric Research Labs, Inc. Personal identification device for mobile telephone
US20060073884A1 (en) * 2005-12-08 2006-04-06 Walker Jay S Systems and methods for post-play gaming benefits
US7027801B1 (en) * 2001-02-06 2006-04-11 Nortel Networks Limited Method delivering location-base targeted advertisements to mobile subscribers
US20070004377A1 (en) * 2005-06-30 2007-01-04 Brad Medford Emergency alert systems and methods
US20070072593A1 (en) 2005-09-16 2007-03-29 Virupakshaiah Huliyapur Math Call prioritizing systems and methods
US20070123223A1 (en) * 2005-11-29 2007-05-31 Gary Letourneau Enhanced analogue of interactive voice response structures and functions for mobile phones and similar handheld communications devices
US20070190995A1 (en) 2006-02-13 2007-08-16 Nokia Corporation Remote control of a mobile device
US20070206747A1 (en) 2006-03-01 2007-09-06 Carol Gruchala System and method for performing call screening
US20070234408A1 (en) * 2006-03-31 2007-10-04 Novell, Inc. Methods and systems for multifactor authentication
US20080037720A1 (en) * 2006-07-27 2008-02-14 Speechphone, Llc Voice Activated Communication Using Automatically Updated Address Books
US20080070697A1 (en) 2006-09-15 2008-03-20 Icebreaker, Inc. Social interaction games and activities
US7352855B2 (en) * 2003-08-22 2008-04-01 At&T Delaware Intellectual Property, Inc. Method and system for providing a privacy management service
US20080088639A1 (en) 2006-10-13 2008-04-17 Sony Ericsson Mobile Communications Ab Method for generating a graphical user interface
US20080146200A1 (en) * 2006-12-18 2008-06-19 Jennifer Martin Method and system for automatic call filtering based on user selectable parameters
US20080254776A1 (en) * 2006-12-28 2008-10-16 Zhangping Ma Method for implementing do-not-disturb service and intelligent phone terminal
US20090041222A1 (en) * 2007-08-07 2009-02-12 Metropcs Wireless, Inc. Selective call reject feature for a telephone
US7515699B2 (en) * 2003-04-14 2009-04-07 Avaya Inc. Call handling using non-speech cues via a personal assistant
US7548754B2 (en) 2003-04-11 2009-06-16 Hewlett-Packard Development Company, L.P. Authentication and non-interfering SMS-messaging in GSM telephone communication
US7624165B2 (en) 2002-05-03 2009-11-24 Coco Communications Corp. Method and apparatus for persistent connections to a device through the use of multiple physical network connections and connection hand-offs between multiple bands, modes and networks
US7715820B2 (en) * 2003-10-30 2010-05-11 Samsung Electronics Co., Ltd Method for connecting a call in a mobile station during an emergency situation
US7725103B2 (en) 2001-02-20 2010-05-25 Microsoft Corporation Mobile communication device dynamic service application and dynamic service application scripting
US7756545B2 (en) 2005-12-13 2010-07-13 Snapin Software Inc. Method for performing interactive services on a mobile device, such as time or location initiated interactive services
US7831029B2 (en) * 1997-09-08 2010-11-09 Gross Karen A Single telephone number access to multiple communications services
US20110250874A1 (en) * 2010-04-08 2011-10-13 Qualcomm Incorporated Enhanced telephony services
US8135119B1 (en) * 2008-11-04 2012-03-13 Trend Micro Incorporated Techniques for protecting telephone users from caller ID spoofing attacks
US8229404B2 (en) 2007-12-17 2012-07-24 Embarq Holdings Company, Llc Method and system for call gating
US8325899B2 (en) * 2003-12-12 2012-12-04 Bradley J. Martin Telephone call screening and routing device and related method
US8437460B2 (en) * 2006-08-30 2013-05-07 At&T Intellectual Property I, L.P. User supervision and notification
US8442505B1 (en) * 2007-03-19 2013-05-14 Sprint Communications Company L.P. Caller ID handling system for calls placed to a mobile phone

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210479A1 (en) * 1996-10-25 2004-10-21 Ipf, Inc. Internet-based brand marketing communication instrumentation network for deploying, installing and remotely programming brand-building server-side driven multi-mode virtual kiosks on the World Wide Web (WWW), and methods of brand marketing communication between brand marketers and consumers using the same
US6115602A (en) 1996-11-21 2000-09-05 At&T Corp. Method and system for call screening
US6115596A (en) 1997-04-22 2000-09-05 Ericsson Inc. Systems and methods for handling emergency calls in hierarchical cell structures
US7831029B2 (en) * 1997-09-08 2010-11-09 Gross Karen A Single telephone number access to multiple communications services
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US7027801B1 (en) * 2001-02-06 2006-04-11 Nortel Networks Limited Method delivering location-base targeted advertisements to mobile subscribers
US7725103B2 (en) 2001-02-20 2010-05-25 Microsoft Corporation Mobile communication device dynamic service application and dynamic service application scripting
US20030045279A1 (en) 2001-09-05 2003-03-06 Robert Shostak Voice-controlled wireless communications system and method
US20040030719A1 (en) 2002-02-13 2004-02-12 Jie Wei Web page based dynamic book for document presentation and operation
US7624165B2 (en) 2002-05-03 2009-11-24 Coco Communications Corp. Method and apparatus for persistent connections to a device through the use of multiple physical network connections and connection hand-offs between multiple bands, modes and networks
US20040101118A1 (en) * 2002-09-06 2004-05-27 Steven Powell Caller identification data management
US6975853B2 (en) 2002-10-22 2005-12-13 Mitsubishi Electric Research Labs, Inc. Personal identification device for mobile telephone
US20040192272A1 (en) * 2003-03-26 2004-09-30 Samsung Electronics Co., Ltd. Method of starting an application program of a mobile terminal and method of providing service data in a mobile communication system
US7548754B2 (en) 2003-04-11 2009-06-16 Hewlett-Packard Development Company, L.P. Authentication and non-interfering SMS-messaging in GSM telephone communication
US7515699B2 (en) * 2003-04-14 2009-04-07 Avaya Inc. Call handling using non-speech cues via a personal assistant
US7352855B2 (en) * 2003-08-22 2008-04-01 At&T Delaware Intellectual Property, Inc. Method and system for providing a privacy management service
US7715820B2 (en) * 2003-10-30 2010-05-11 Samsung Electronics Co., Ltd Method for connecting a call in a mobile station during an emergency situation
US8325899B2 (en) * 2003-12-12 2012-12-04 Bradley J. Martin Telephone call screening and routing device and related method
US20050255861A1 (en) * 2004-04-15 2005-11-17 Brian Wilson System for providing location-based services in a wireless network, such as locating sets of desired locations
US20050233735A1 (en) * 2004-04-16 2005-10-20 Jeyhan Karaoguz Enhanced caller ID information based on access device information via a broadband access gateway
US20070004377A1 (en) * 2005-06-30 2007-01-04 Brad Medford Emergency alert systems and methods
US20070072593A1 (en) 2005-09-16 2007-03-29 Virupakshaiah Huliyapur Math Call prioritizing systems and methods
US20070123223A1 (en) * 2005-11-29 2007-05-31 Gary Letourneau Enhanced analogue of interactive voice response structures and functions for mobile phones and similar handheld communications devices
US20060073884A1 (en) * 2005-12-08 2006-04-06 Walker Jay S Systems and methods for post-play gaming benefits
US7756545B2 (en) 2005-12-13 2010-07-13 Snapin Software Inc. Method for performing interactive services on a mobile device, such as time or location initiated interactive services
US20070190995A1 (en) 2006-02-13 2007-08-16 Nokia Corporation Remote control of a mobile device
US20070206747A1 (en) 2006-03-01 2007-09-06 Carol Gruchala System and method for performing call screening
US20070234408A1 (en) * 2006-03-31 2007-10-04 Novell, Inc. Methods and systems for multifactor authentication
US20080037720A1 (en) * 2006-07-27 2008-02-14 Speechphone, Llc Voice Activated Communication Using Automatically Updated Address Books
US8437460B2 (en) * 2006-08-30 2013-05-07 At&T Intellectual Property I, L.P. User supervision and notification
US20080070697A1 (en) 2006-09-15 2008-03-20 Icebreaker, Inc. Social interaction games and activities
US20080088639A1 (en) 2006-10-13 2008-04-17 Sony Ericsson Mobile Communications Ab Method for generating a graphical user interface
US20080146200A1 (en) * 2006-12-18 2008-06-19 Jennifer Martin Method and system for automatic call filtering based on user selectable parameters
US20080254776A1 (en) * 2006-12-28 2008-10-16 Zhangping Ma Method for implementing do-not-disturb service and intelligent phone terminal
US8442505B1 (en) * 2007-03-19 2013-05-14 Sprint Communications Company L.P. Caller ID handling system for calls placed to a mobile phone
US20090041222A1 (en) * 2007-08-07 2009-02-12 Metropcs Wireless, Inc. Selective call reject feature for a telephone
US8229404B2 (en) 2007-12-17 2012-07-24 Embarq Holdings Company, Llc Method and system for call gating
US8135119B1 (en) * 2008-11-04 2012-03-13 Trend Micro Incorporated Techniques for protecting telephone users from caller ID spoofing attacks
US20110250874A1 (en) * 2010-04-08 2011-10-13 Qualcomm Incorporated Enhanced telephony services

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9066203B2 (en) 2009-03-05 2015-06-23 CenturyLink Intellectual Proprty LLC System and method for restricting communications at a network level

Also Published As

Publication number Publication date
US20130295896A1 (en) 2013-11-07
US8509752B2 (en) 2013-08-13
US20090156187A1 (en) 2009-06-18
US8229404B2 (en) 2012-07-24
US20120260308A1 (en) 2012-10-11

Similar Documents

Publication Publication Date Title
US20070206747A1 (en) System and method for performing call screening
US8504633B2 (en) Method and system for communicating a data file
US10992801B2 (en) Systems and methods for providing caller identification over a public switched telephone network
US8156182B2 (en) System and method for inter-platform communications blocking
US20100046731A1 (en) Method, apparatus and system for use of presence and location information in intelligent call routing
US20090097631A1 (en) Method, apparatus and system for routing a call using overflow groups
US8290126B2 (en) System and method for a visual voicemail interface
US20080207167A1 (en) System and method for remotely managing wireless devices
US8064876B2 (en) Systems for use with multi-number cellular devices
US20070206566A1 (en) Adaptive phonebook database supporting communications between multiple users and devices
US20020031207A1 (en) User editable database to forward communications sent to an unified assess number to caller-specific destinations
US8750848B2 (en) System and method for limiting communications
EP2100435B1 (en) A method and apparatus for linking identification data to a call between networks
US11758041B2 (en) Call content management for mobile devices
US8718259B2 (en) System and method for hold and re-ring
US20210144521A1 (en) Call content management for mobile devices
US20140113604A1 (en) Method and apparatus for providing caller information upon reception of an incoming call in a communication system supporting enterprise mobility communication
US11863698B2 (en) Call content management for mobile devices
US7609659B2 (en) Systems and methods for facilitating communication over a plurality of communication mediums
US9413895B1 (en) System and method for mapping a voice identity across multiple telephony networks with time attributes
US8611510B2 (en) System and method for guest voicemail box
US8111822B1 (en) System and method for mapping a voice identity across multiple telephony networks with time attributes
WO2020049323A1 (en) System for making and receiving telephone calls
Headquarters Cisco Unified IP Conference Station 7937G Phone Guide for Cisco Unified Communications Manager 6.0
KR20170070474A (en) System and method for providing interphone service

Legal Events

Date Code Title Description
AS Assignment

Owner name: CENTURYLINK INTELLECTUAL PROPERTY LLC, COLORADO

Free format text: CHANGE OF NAME;ASSIGNOR:EMBARQ HOLDINGS COMPANY, LLC;REEL/FRAME:030813/0578

Effective date: 20120323

Owner name: EMBARQ HOLDINGS COMPANY, LLC, KANSAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SWEENEY, JEFFREY M.;DOYLE, JENNIFER D.;SIGNING DATES FROM 20071214 TO 20071216;REEL/FRAME:030810/0422

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8